There are quite a few ways to authenticate users who want access to your organization's network resources. Depending on how critical the data is that you're protecting, one method may or may not provide the level of protection you want. Take this quiz to test your knowledge of authentication methods and learn more about them.

By submitting your personal information, you agree to receive emails regarding relevant products and special offers from TechTarget and its partners. You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

How to take the quiz: - After reading the question, click on the answer that you think is correct to go to the WhatIs.com definition. If the answer you've chosen is correct, you will see the question text or an approximation of it somewhere in the definition. OR - Check your answers by using the answer key at the end of the quiz.

3.) This secure method for authenticating a request for a service in a computer network was developed through the Athena Project at the Massachusetts Institute of Technology.a. AESb. Carnivorec. Automated Fingerprint Identification Systemd. Internet Key Exchangee. Kerberos

5.) This is an older authentication protocol common to Unix networks that allows a remote access server to forward a user's logon password to an authentication server to determine whether access can be allowed to a given system. a. DRPb. CPRMc. TACACSd. GPOe. C2

9.) A primary goal of this consortium is to promote interoperability among biometric applications.a. IDEAb. PKCSc. Twofishd. BioAPI e. Tempest

10.) This is a client/server protocol and software that enables remote access servers to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or service.a. OFBb. BO2Kc. ICMPd. DESe. RADIUS

E-Zine

0 comments

E-Mail

Username / Password

Password

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy